U.S. Cyber Command is reportedly going on offense against Russia's power grid by placing "potentially crippling malware" in its systems, The New York Times reported Saturday.
The cyber incursions, authorized to Cyber Command under new authorities that do not require presidential approval, have gotten more "aggressive" and seem to be a warning that the U.S. can respond to Moscow's past cyberattacks, such as the 2016 incursion into the Democratic National Committee and its attack on Ukraine's power grid.
"It has gotten far, far more aggressive over the past year," one senior intelligence official told The Times. "We are doing things at a scale that we never contemplated a few years ago."
The Times writes:
Both General Nakasone and Mr. Bolton, through spokesmen, declined to answer questions about the incursions into Russia's grid. Officials at the National Security Council also declined to comment but said they had no national security concerns about the details of The New York Times's reporting about the targeting of the Russian grid, perhaps an indication that some of the intrusions were intended to be noticed by the Russians.
Given the nature of Cyber Command's work is highly classified, it is not known what the malware being used against Russia is capable of.
However, some insight may be gleaned from a previously-reported program called Nitro Zeus — the code name for an operation that allowed the U.S. to shut down much of Iran's infrastructure ahead of a full-scale war through cyber means.
The plan for Nitro Zeus went much further than Stuxnet — the first known cyber weapon to cause physical damage — allowing the National Security Agency to attack Iran's command-and-control systems, so it would not be able to communicate. It could hack in and disable air defenses, so US or Israeli planes would not be shot down. And systems such as the power grid, communications, and financial systems were all infected or backdoored, in case of war.
"This was an enormous, and enormously complex, program," one participant in the program told The New York Times. "Before it was developed, the US had never assembled a combined cyber and kinetic attack plan on this scale."
WASHINGTON (Reuters) - The U.S. military on Sunday accused a Venezuelan fighter aircraft of "aggressively" shadowing a U.S. Navy EP-3 Aries II plane over international airspace, in yet another sign of the increasing hostility between the two nations.
The encounter between the U.S. and Venezuelan planes occurred on Friday, the same day that the Trump administration announced it was sanctioning four top officials in Venezuela's military counterintelligence agency.
In this March 12, 2016, file photo, Marines of the U.S., left, and South Korea, wearing blue headbands on their helmets, take positions after landing on a beach during the joint military combined amphibious exercise, called Ssangyong, part of the Key Resolve and Foal Eagle military exercises, in Pohang, South Korea. (Associated Press/Yonhap/Kim Jun-bum)
Joint U.S.-South Korean military exercises scheduled for next month are going ahead, a top Seoul official said Saturday, despite a threat by North Korea to boycott working-level talks with Washington and possibly restart nuclear and longer-range missile tests.
(Reuters) - A former National Security Agency contractor was sentenced in Maryland to nine years in prison on Friday for stealing huge amounts of classified material from U.S. intelligence agencies over two decades though officials never found proof he shared it with anyone.